[SCM] httpcomponents-client: HTTP/1.1 compliant HTTP agent Java implementation branch, master, updated. debian/4.2.1-2-13-g22568d1
Damien Raude-Morvan
drazzib at debian.org
Wed May 8 11:05:07 UTC 2013
The following commit has been merged in the master branch:
commit 05eff63871c281c51666640e37e78e96924e96e6
Author: Damien Raude-Morvan <drazzib at debian.org>
Date: Wed May 8 00:18:14 2013 +0200
d/patches/02-700268.patch: Drop, included in upstream release.
diff --git a/debian/changelog b/debian/changelog
index f47cafc..7972420 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -2,6 +2,7 @@ httpcomponents-client (4.2.5-1) unstable; urgency=low
* New upstream release.
* d/rules: Add get-orig-source target.
+ * d/patches/02-700268.patch: Drop, included in upstream release.
-- Damien Raude-Morvan <drazzib at debian.org> Tue, 07 May 2013 23:58:33 +0200
diff --git a/debian/patches/02-700268.patch b/debian/patches/02-700268.patch
deleted file mode 100644
index 7627e31..0000000
--- a/debian/patches/02-700268.patch
+++ /dev/null
@@ -1,91 +0,0 @@
-Description: Corrects security defect:
- Wildcard matching in hostname verifier incorrect
-Source: https://fisheye6.atlassian.com/rdiff/httpcomponents?csid=1406213&u&N
-Forwarded: not-needed
-
-Index: httpclient/src/test/java/org/apache/http/conn/ssl/TestHostnameVerifier.java
-===================================================================
-diff -u -N -r1356672 -r1406213
---- a/httpclient/src/test/java/org/apache/http/conn/ssl/TestHostnameVerifier.java (.../TestHostnameVerifier.java) (revision 1356672)
-+++ b/httpclient/src/test/java/org/apache/http/conn/ssl/TestHostnameVerifier.java (.../TestHostnameVerifier.java) (revision 1406213)
-@@ -300,7 +300,7 @@
- }
-
- @Test
-- public void HTTPCLIENT_1097() {
-+ public void testHTTPCLIENT_1097() {
- String cns[];
- String alt[] = {};
- X509HostnameVerifier bhv = new BrowserCompatHostnameVerifier();
-@@ -318,6 +318,17 @@
- checkWildcard("s*.gouv.uk", false); // 2 character TLD, invalid 2TLD
- }
-
-+ @Test
-+ public void testHTTPCLIENT_1255() {
-+ X509HostnameVerifier bhv = new BrowserCompatHostnameVerifier();
-+ X509HostnameVerifier shv = new StrictHostnameVerifier();
-+
-+ String cns[] = new String []{"m*.a.b.c.com"}; // component part
-+ String alt[] = {};
-+ checkMatching(bhv, "mail.a.b.c.com", cns, alt, false); // OK
-+ checkMatching(shv, "mail.a.b.c.com", cns, alt, false); // OK
-+ }
-+
- // Helper
- private void checkWildcard(String host, boolean isOK) {
- Assert.assertTrue(host+" should be "+isOK, isOK==AbstractVerifier.acceptableCountryWildcard(host));
-Index: libhttpclient-java/RELEASE_NOTES.txt
-===================================================================
-diff -u -N -r1400612 -r1406213
---- a/RELEASE_NOTES.txt (.../RELEASE_NOTES.txt) (revision 1400612)
-+++ b/RELEASE_NOTES.txt (.../RELEASE_NOTES.txt) (revision 1406213)
-@@ -1,3 +1,11 @@
-+Changes since 4.2.1
-+-------------------
-+
-+* [HTTPCLIENT-1255] AbstractVerifier incorrectly parses certificate CN containing wildcard
-+ Contributed by Oleg Kalnichevski <olegk at apache.org>
-+
-+
-+
- Release 4.2.1
- -------------------
-
-Index: libhttpclient-java/httpclient/src/main/java/org/apache/http/conn/ssl/AbstractVerifier.java
-===================================================================
-diff -u -N -r1356672 -r1406213
---- a/httpclient/src/main/java/org/apache/http/conn/ssl/AbstractVerifier.java (.../AbstractVerifier.java) (revision 1356672)
-+++ b/httpclient/src/main/java/org/apache/http/conn/ssl/AbstractVerifier.java (.../AbstractVerifier.java) (revision 1406213)
-@@ -43,8 +43,6 @@
- import java.util.List;
- import java.util.Locale;
- import java.util.StringTokenizer;
--import java.util.logging.Logger;
--import java.util.logging.Level;
-
- import javax.net.ssl.SSLException;
- import javax.net.ssl.SSLSession;
-@@ -204,9 +202,10 @@
- !isIPAddress(host);
-
- if(doWildcard) {
-- if (parts[0].length() > 1) { // e.g. server*
-- String prefix = parts[0].substring(0, parts.length-2); // e.g. server
-- String suffix = cn.substring(parts[0].length()); // skip wildcard part from cn
-+ String firstpart = parts[0];
-+ if (firstpart.length() > 1) { // e.g. server*
-+ String prefix = firstpart.substring(0, firstpart.length() - 1); // e.g. server
-+ String suffix = cn.substring(firstpart.length()); // skip wildcard part from cn
- String hostSuffix = hostName.substring(prefix.length()); // skip wildcard part from host
- match = hostName.startsWith(prefix) && hostSuffix.endsWith(suffix);
- } else {
-@@ -302,8 +301,6 @@
- c = cert.getSubjectAlternativeNames();
- }
- catch(CertificateParsingException cpe) {
-- Logger.getLogger(AbstractVerifier.class.getName())
-- .log(Level.FINE, "Error parsing certificate.", cpe);
- }
- if(c != null) {
- for (List<?> aC : c) {
diff --git a/debian/patches/series b/debian/patches/series
index 44d53ad..d39b602 100644
--- a/debian/patches/series
+++ b/debian/patches/series
@@ -1,3 +1,2 @@
00-fix_build.patch
01-generate_osgi_metadata.patch
-02-700268.patch
--
httpcomponents-client: HTTP/1.1 compliant HTTP agent Java implementation
More information about the pkg-java-commits
mailing list